Edit WYSIWYGattachfile Attach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
325 Feb 2014 - 09:53norqu036? 
225 Feb 2014 - 09:52norqu036? 
120 Feb 2013 - 09:42NicLewisAttached file allendangerahead.pdf

Attached file amessecuritytechnology.pdf

Attached file bankingcomputerfraud.pdf

Attached file beggsbakerindividualprivacy.pdf

Attached file bigelowlegalsecurity.pdf

Attached file blasgendatabase.pdf

Attached file denningcertification.pdf

Attached file denningdatasecurity.pdf

Attached file freedcomputerfraud.pdf

Attached file grahamdenningpopular.pdf

Attached file hawkinsedp.pdf

Attached file hendersonprivacy.pdf

Attached file hortonprivacy.pdf

Attached file howesedp.pdf

Attached file johnsonprotectionprimer.pdf

Attached file kakdatasecurity.pdf

Attached file kolatabreakins.pdf

Attached file kolataencryption.pdf

Attached file landwehrformalmodels.pdf

Attached file landwehrtechnologies.pdf

Attached file linowessatellites.pdf

Attached file millenkernel.pdf

Attached file morranedplosses.pdf

Attached file morrisbellsystem.pdf

Attached file newthreats.pdf

Attached file orceyre.pdf

Attached file paytoncomputersecurity.pdf

Attached file petersoncomputerhacking.pdf

Attached file securitydefenses.pdf

Attached file shapley---social-security.pdf

Attached file stoneintegrity.pdf

Attached file tuchmancomputersecurityibm.pdf

Attached file turnwareprivacyandsecurity.pdf

Attached file wassermanleaks.pdf

Attached file wearstlercomputercenter.pdf

Attached file weberaudit.pdf

Attached file williamsadmissions.pdf 

Render style:     Context:


 History: r3 < r2 < r1
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>Publications>ClassicPapersPopularLiterature>ClassicPapersPopularLiteratureFiles (25 Feb 2014, norqu036)

-- NicLewis - 20 Feb 2013
Topic attachments
I Attachment Action SizeSorted ascending Date Who Comment
pdfpdf securitydefenses.pdf manage 65.0 K 20 Feb 2013 - 09:38 NicLewis Security Defenses for the Computer Room.
pdfpdf hawkinsedp.pdf manage 90.4 K 20 Feb 2013 - 09:27 NicLewis Hawkins - Protecting EDP Systems from Fifth-Column Attacks.
pdfpdf howesedp.pdf manage 113.0 K 20 Feb 2013 - 09:28 NicLewis Howes - EDP Security: Is Your Guard Up?
pdfpdf tuchmancomputersecurityibm.pdf manage 212.3 K 20 Feb 2013 - 09:40 NicLewis Tuchman - Computer Security and IBM
pdfpdf morrisbellsystem.pdf manage 243.3 K 20 Feb 2013 - 09:36 NicLewis Morris - Computer Security and the Bell System.
pdfpdf petersoncomputerhacking.pdf manage 254.5 K 20 Feb 2013 - 09:38 NicLewis Peterson - Computer Hacking and Security Costs.
pdfpdf hendersonprivacy.pdf manage 312.3 K 20 Feb 2013 - 09:27 NicLewis Henderson - Computers and Privacy.
pdfpdf stoneintegrity.pdf manage 348.2 K 20 Feb 2013 - 09:39 NicLewis Stone - Some Security and Integrity Controls in Small Computer Systems.
pdfpdf williamsadmissions.pdf manage 356.1 K 20 Feb 2013 - 09:42 NicLewis Williams - Computer-Assisted Admission Process.
pdfpdf shapley---social-security.pdf manage 413.2 K 20 Feb 2013 - 09:39 NicLewis Shapely - Social Security Computers Vulnerable, GAO Says.
pdfpdf newthreats.pdf manage 462.3 K 20 Feb 2013 - 09:36 NicLewis New Threats and New Defenses.
pdfpdf johnsonprotectionprimer.pdf manage 480.2 K 20 Feb 2013 - 09:28 NicLewis Johnson - A Protection Primer for EDP Records.
pdfpdf allendangerahead.pdf manage 483.0 K 20 Feb 2013 - 09:22 NicLewis Allen - Danger Ahead! Safeguard Your Computer.
pdfpdf weberaudit.pdf manage 483.8 K 20 Feb 2013 - 09:42 NicLewis Weber - Audit Perspective of Operating System Security.
pdfpdf beggsbakerindividualprivacy.pdf manage 493.2 K 20 Feb 2013 - 09:23 NicLewis Beggs-Baker - Individual Privacy Considerations for Computerized Health Information Systems.
pdfpdf bankingcomputerfraud.pdf manage 517.0 K 20 Feb 2013 - 09:23 NicLewis Guarding Against Computer Fraud.
pdfpdf orceyre.pdf manage 532.6 K 20 Feb 2013 - 09:37 NicLewis Orceyre - Data Security.
pdfpdf kolatabreakins.pdf manage 555.8 K 20 Feb 2013 - 09:29 NicLewis Kolata - Computer Break-Ins Fans Security Fears.
pdfpdf freedcomputerfraud.pdf manage 558.9 K 20 Feb 2013 - 09:26 NicLewis Freed - Computer Fraud - A Management Trap.
pdfpdf wearstlercomputercenter.pdf manage 582.4 K 20 Feb 2013 - 09:41 NicLewis Wearstler - A Computer Center is for Safety, Not for Show.
pdfpdf hortonprivacy.pdf manage 585.3 K 20 Feb 2013 - 09:28 NicLewis Frank Horton - Privacy, Security, and A Free America.
pdfpdf millenkernel.pdf manage 657.2 K 20 Feb 2013 - 09:34 NicLewis Millen - Security Kernel Validation in Practice.
pdfpdf kolataencryption.pdf manage 694.5 K 20 Feb 2013 - 09:30 NicLewis Kolata - Computer Encryption and the National Security Agency Connection.
pdfpdf bigelowlegalsecurity.pdf manage 843.5 K 20 Feb 2013 - 09:24 NicLewis Bigelow - Legal & Security Issues Posed By Computer Utilities.
pdfpdf denningcertification.pdf manage 891.3 K 20 Feb 2013 - 09:25 NicLewis Denning and Denning - Certification of Programs for Secure Information Flow.
pdfpdf blasgendatabase.pdf manage 937.9 K 20 Feb 2013 - 09:25 NicLewis Basgen - Database Systems.
pdfpdf paytoncomputersecurity.pdf manage 980.3 K 20 Feb 2013 - 09:37 NicLewis Payton - ABC of Computing - Computer Security.
pdfpdf morranedplosses.pdf manage 1052.4 K 20 Feb 2013 - 09:35 NicLewis Morran - How Does Your Bank Stack Up In Insurance Against EDP Losses?
pdfpdf grahamdenningpopular.pdf manage 1635.5 K 20 Feb 2013 - 09:26 NicLewis Graham and Denning - Protection: Principles and Practice.
pdfpdf turnwareprivacyandsecurity.pdf manage 1696.5 K 20 Feb 2013 - 09:40 NicLewis Turn Ware - Privacy and Security in Computer Systems.
pdfpdf denningdatasecurity.pdf manage 1922.9 K 20 Feb 2013 - 09:25 NicLewis Dorothy and Peter Denning - Data Security.
pdfpdf wassermanleaks.pdf manage 2270.5 K 20 Feb 2013 - 09:41 NicLewis Wasserman - Plugging the Leaks in Computer Security.
pdfpdf landwehrformalmodels.pdf manage 2911.0 K 20 Feb 2013 - 09:30 NicLewis Landwehr - Formal Models for Computer Security.
pdfpdf kakdatasecurity.pdf manage 3311.0 K 20 Feb 2013 - 09:29 NicLewis Kak - Data Security in Computer Networks.
pdfpdf amessecuritytechnology.pdf manage 3320.8 K 20 Feb 2013 - 09:22 NicLewis Ames - Security Technology - Guest Editors' Introduction.
pdfpdf linowessatellites.pdf manage 3969.4 K 20 Feb 2013 - 09:34 NicLewis Linowes - Communications Satellites: Their Impact on the CPA.
pdfpdf landwehrtechnologies.pdf manage 4269.2 K 20 Feb 2013 - 09:33 NicLewis Landwehr - The Best Available Technologies for Computer Security.
Topic revision: r3 - 25 Feb 2014 - 09:53:56 - norqu036
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback